Chapters
Executive summary
APEX Cyber Recovery Services
Shared responsibility model
Architecture
Identity and access management
This paper describes the internal security controls, and suggested best practices, to guide customers who use Dell APEX Cyber Recovery Services. It also describes the shared security responsibilities between Dell Technologies and the customer.